{"id":56410,"date":"2024-06-26T13:34:32","date_gmt":"2024-06-26T13:34:32","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/36037\/Probllama-Ollama-Remote-Code-Execution-Vulnerability.html"},"modified":"2024-06-26T13:34:32","modified_gmt":"2024-06-26T13:34:32","slug":"probllama-ollama-remote-code-execution-vulnerability","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/probllama-ollama-remote-code-execution-vulnerability\/","title":{"rendered":"Probllama: Ollama Remote Code Execution Vulnerability"},"content":{"rendered":"<p class><a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/ollama.com\/\"><u>Ollama<\/u><\/a> is one of the most popular open-source projects for running AI Models, with over 70k stars on <a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/github.com\/ollama\/ollama\"><u>GitHub<\/u><\/a> and hundreds of thousands of monthly pulls on <a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/hub.docker.com\/r\/ollama\/ollama\"><u>Docker Hub<\/u><\/a>. Inspired by Docker, Ollama aims to simplify the process of packaging and deploying AI models.&nbsp;<\/p>\n<p class>Wiz Research discovered an easy-to-exploit Remote Code Execution vulnerability in Ollama: CVE-2024-37032, dubbed \u201cProbllama.\u201d This security issue was responsibly disclosed to Ollama\u2019s maintainers and has since been mitigated. Ollama users are encouraged to upgrade their Ollama installation to version 0.1.34 or newer.&nbsp;<\/p>\n<p class>Our research indicates that, as of June 10, there are a large number of Ollama instances running a vulnerable version that are exposed to the internet. In this blog post, we will detail what we found and how we found it, as well as mitigation techniques and preventative measures organizations can take moving forward.&nbsp;&nbsp;<\/p>\n<p class>Taken as a whole \u2013 and in light of the Wiz Research team\u2019s ongoing focus on the risk inherent to AI systems \u2013 our findings underscore the fact that <a href=\"https:\/\/www.wiz.io\/academy\/ai-security-best-practices\">AI security measure<\/a>s have been largely sidelined in favor of focusing on the transformative power of this technology, and its potential to revolutionize the way business gets done.&nbsp;&nbsp;<\/p>\n<p class>Organizations are rapidly adopting a variety of new AI tools and infrastructure in an attempt to hone their competitive edge. These tools are often at an early stage of development and lack standardized security features, such as authentication. Additionally, due to their young code base, it is relatively easier to find critical software vulnerabilities, making them perfect targets for potential threat actors. This is a recurring theme in our discoveries \u2013 see prior Wiz Research work on AI-as-a-service-providers <a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.wiz.io\/blog\/wiz-and-hugging-face-address-risks-to-ai-infrastructure\"><u>Hugging Face<\/u><\/a> and <a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.wiz.io\/blog\/wiz-research-discovers-critical-vulnerability-in-replicate\"><u>Replicate<\/u><\/a>, as well as our <a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.wiz.io\/blog\/key-findings-from-the-state-of-ai-in-the-cloud-report-2024\"><u><em>State of AI in the Cloud<\/em><\/u><u> report<\/u><\/a> and <a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.wiz.io\/blog\/38-terabytes-of-private-data-accidentally-exposed-by-microsoft-ai-researchers\"><u>last year\u2019s discovery of 38TB of data<\/u><\/a> that was accidentally leaked by AI researchers.&nbsp;&nbsp;<\/p>\n<p class>Over the past year, multiple remote code execution (RCE) vulnerabilities were identified in inference servers, including TorchServe, Ray Anyscale, and Ollama. These vulnerabilities could allow attackers to take over self-hosted AI inference servers, steal or modify AI models, and compromise AI applications.&nbsp;&nbsp;<\/p>\n<p class>The critical issue is not just the vulnerabilities themselves but the inherent lack of authentication support in these new tools. If exposed to the internet, any attacker can connect to them, steal or modify the AI models, or even execute remote code as a built-in feature (as seen with TorchServe and <a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/www.oligo.security\/blog\/shadowray-attack-ai-workloads-actively-exploited-in-the-wild\"><u>Ray Anyscale<\/u><\/a>). The lack of authentication support means these tools should never be exposed externally without protective middleware, such as a reverse proxy with authentication. Despite this, when scanning the internet for exposed Ollama servers, our scan revealed over 1,000 exposed instances hosting numerous AI models, including private models not listed in the Ollama public repository, highlighting a significant security gap.&nbsp;<\/p>\n<p class>To exploit this vulnerability, an attacker must send specially crafted HTTP requests to the Ollama API server. In the <a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/github.com\/ollama\/ollama\/?tab=readme-ov-file#linux\"><u>default Linux installation<\/u><\/a>, the API server binds to localhost, which reduces remote exploitation risk significantly. However, in <strong>docker deployments<\/strong> (<a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/hub.docker.com\/r\/ollama\/ollama\"><u>ollama\/ollama<\/u><\/a>), <strong>the API server is publicly exposed<\/strong>, and therefore could be exploited remotely.&nbsp;<\/p>\n<p class>Wiz customers can use the pre-built query and advisory in the Wiz Threat Center to search for vulnerable instances in their environment.&nbsp;<\/p>\n<h2>Why research Ollama?&nbsp;<\/h2>\n<p class>Our research team makes an active effort to contribute to the security of AI services, tooling, and infrastructure, and we also use AI in our research work.&nbsp;<\/p>\n<p class>For a different project, we looked to leverage a large-context AI model. Luckily, around that time, <a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/huggingface.co\/gradientai\/Llama-3-70B-Instruct-Gradient-1048k\"><u>Gradient released their Llama3 version which has a context of 1m tokens<\/u><\/a>.&nbsp;&nbsp;<\/p>\n<p class>Being one of the most popular open-source projects for running AI Models with over 70k stars on <a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/github.com\/ollama\/ollama\"><u>GitHub<\/u><\/a> and hundreds of thousands of monthly pulls on <a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/hub.docker.com\/r\/ollama\/ollama\"><u>Docker Hub<\/u><\/a>, Ollama seemed to be the simplest way to self-host <a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/ollama.com\/library\/llama3-gradient\"><u>that model<\/u><\/a> ????.&nbsp;<\/p>\n<figure><button class=\"w-full cursor-zoom-in\"><\/p>\n<div class=\"relative overflow-hidden rounded-md sm:rounded-xl w-full shadow-md sm:shadow-xl\">\n<div class=\"z-[1]\"><img decoding=\"async\" aria-hidden=\"true\" alt src=\"data:image\/jpeg;base64,\/9j\/4AAQSkZJRgABAQAAAQABAAD\/2wCEAAoHBwgHBgoICAgFCgoFBQwFBQUFBREJCgUMFxMZGBYTFhUaHysjGh0oHRUWJDUlKC0vMjIyGSI4PTcwPCsxMi8BCgsLBQUFEAUFEC8cFhwvLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vL\/\/AABEIAAUAGAMBIgACEQEDEQH\/xAAVAAEBAAAAAAAAAAAAAAAAAAAAB\/\/EABQQAQAAAAAAAAAAAAAAAAAAAAD\/xAAVAQEBAAAAAAAAAAAAAAAAAAACAP\/EABQRAQAAAAAAAAAAAAAAAAAAAAD\/2gAMAwEAAhEDEQA\/ALEAQgCT\/9k=\"><noscript><picture><source srcset=\"https:\/\/www.datocms-assets.com\/75231\/1719177462-image1.png?dpr=0.25&amp;fm=webp 232w, https:\/\/www.datocms-assets.com\/75231\/1719177462-image1.png?dpr=0.5&amp;fm=webp 465w, https:\/\/www.datocms-assets.com\/75231\/1719177462-image1.png?dpr=0.75&amp;fm=webp 698w, https:\/\/www.datocms-assets.com\/75231\/1719177462-image1.png?fm=webp 931w\" sizes=\"(max-width: 931px) 100vw, 931px\" type=\"image\/webp\"><source srcset=\"https:\/\/www.datocms-assets.com\/75231\/1719177462-image1.png?dpr=0.25&amp;fm=webp 232w, https:\/\/www.datocms-assets.com\/75231\/1719177462-image1.png?dpr=0.5&amp;fm=webp 465w, https:\/\/www.datocms-assets.com\/75231\/1719177462-image1.png?dpr=0.75&amp;fm=webp 698w, https:\/\/www.datocms-assets.com\/75231\/1719177462-image1.png?fm=webp 931w\" sizes=\"(max-width: 931px) 100vw, 931px\"><img decoding=\"async\" src=\"https:\/\/www.datocms-assets.com\/75231\/1719177462-image1.png?fm=webp\" alt loading=\"lazy\"><\/picture><\/noscript><\/div>\n<\/div>\n<p><\/button><\/figure>\n<h2>&nbsp;Ollama Architecture&nbsp;<\/h2>\n<p class>Ollama consists of two main components: a client and a server. The server exposes <a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/github.com\/ollama\/ollama\/blob\/main\/docs\/api.md\"><u>multiple APIs<\/u><\/a> to perform core functions, such as pulling a model from the registry, generating a prediction for a given prompt, etc. The client is what the user interacts with (i.e. the front-end), which could be, for example, a CLI (command-line interface).&nbsp;<\/p>\n<p class>While experimenting with Ollama, our team found a critical security vulnerability in an Ollama server. Due to insufficient input validation, it is possible to exploit a <a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/owasp.org\/www-community\/attacks\/Path_Traversal\"><u>Path Traversal<\/u><\/a> vulnerability to arbitrarily overwrite files on the server. This can be further exploited into a full Remote Code Execution as we demonstrate below.&nbsp;<\/p>\n<p class>This issue is extremely severe in Docker installations, as the server runs with <code>root<\/code> privileges and listens on <code>0.0.0.0<\/code> by default \u2013 which enables remote exploitation of this vulnerability.&nbsp;<\/p>\n<figure><button class=\"w-full cursor-zoom-in\"><\/p>\n<div class=\"relative overflow-hidden rounded-md sm:rounded-xl w-full shadow-md sm:shadow-xl\">\n<div class=\"z-[1]\"><img decoding=\"async\" aria-hidden=\"true\" alt src=\"data:image\/jpeg;base64,\/9j\/4AAQSkZJRgABAQAAAQABAAD\/2wCEAAoHBwgHBgoICAgFCgoFBQwFBQUFBREJCgUMFxMZGBYTFhUaHysjGh0oHRUWJDUlKC0vMjIyGSI4PTcwPCsxMi8BCgsLBQUFEAUFEC8cFhwvLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vL\/\/AABEIABEAGAMBIgACEQEDEQH\/xAAVAAEBAAAAAAAAAAAAAAAAAAAAB\/\/EABQQAQAAAAAAAAAAAAAAAAAAAAD\/xAAVAQEBAAAAAAAAAAAAAAAAAAAAAv\/EABQRAQAAAAAAAAAAAAAAAAAAAAD\/2gAMAwEAAhEDEQA\/ALEApIAAAAAD\/9k=\"><noscript><picture><source srcset=\"https:\/\/www.datocms-assets.com\/75231\/1719177599-image2.png?dpr=0.25&amp;fm=webp 291w, https:\/\/www.datocms-assets.com\/75231\/1719177599-image2.png?dpr=0.5&amp;fm=webp 582w, https:\/\/www.datocms-assets.com\/75231\/1719177599-image2.png?dpr=0.75&amp;fm=webp 873w, https:\/\/www.datocms-assets.com\/75231\/1719177599-image2.png?fm=webp 1165w\" sizes=\"(max-width: 1165px) 100vw, 1165px\" type=\"image\/webp\"><source srcset=\"https:\/\/www.datocms-assets.com\/75231\/1719177599-image2.png?dpr=0.25&amp;fm=webp 291w, https:\/\/www.datocms-assets.com\/75231\/1719177599-image2.png?dpr=0.5&amp;fm=webp 582w, https:\/\/www.datocms-assets.com\/75231\/1719177599-image2.png?dpr=0.75&amp;fm=webp 873w, https:\/\/www.datocms-assets.com\/75231\/1719177599-image2.png?fm=webp 1165w\" sizes=\"(max-width: 1165px) 100vw, 1165px\"><img decoding=\"async\" src=\"https:\/\/www.datocms-assets.com\/75231\/1719177599-image2.png?fm=webp\" alt loading=\"lazy\"><\/picture><\/noscript><\/div>\n<\/div>\n<p><\/button><\/figure>\n<p class>It is important to mention that Ollama does not support authentication out-of-the-box. It is generally recommended to <a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/github.com\/ollama\/ollama\/issues\/849\"><u>deploy Ollama behind a reverse-proxy<\/u><\/a> to enforce authentication, if the user decides to expose its installation. In practice, our research indicates that there are a large number of installations exposed to the internet without any sort of authentication.&nbsp;<\/p>\n<h2>The Vulnerability: Arbitrary File Write via Path Traversal&nbsp;<\/h2>\n<p class>Ollama\u2019s HTTP server exposes <a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/github.com\/ollama\/ollama\/blob\/main\/docs\/api.md\"><u>multiple API endpoints<\/u><\/a> that perform various actions.&nbsp;&nbsp;<\/p>\n<figure><button class=\"w-full cursor-zoom-in\"><\/p>\n<div class=\"relative overflow-hidden rounded-md sm:rounded-xl w-full shadow-md sm:shadow-xl\">\n<div class=\"z-[1]\"><img decoding=\"async\" aria-hidden=\"true\" alt src=\"data:image\/jpeg;base64,\/9j\/4AAQSkZJRgABAQAAAQABAAD\/2wCEAAoHBwgHBgoICAgFCgoFBQwFBQUFBREJCgUMFxMZGBYTFhUaHysjGh0oHRUWJDUlKC0vMjIyGSI4PTcwPCsxMi8BCgsLBQUFEAUFEC8cFhwvLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vL\/\/AABEIAAwAGAMBIgACEQEDEQH\/xAAVAAEBAAAAAAAAAAAAAAAAAAAAB\/\/EABQQAQAAAAAAAAAAAAAAAAAAAAD\/xAAVAQEBAAAAAAAAAAAAAAAAAAACAP\/EABQRAQAAAAAAAAAAAAAAAAAAAAD\/2gAMAwEAAhEDEQA\/AK8AQgCT\/9k=\"><noscript><picture><source srcset=\"https:\/\/www.datocms-assets.com\/75231\/1719177656-image3.png?dpr=0.25&amp;fm=webp 631w, https:\/\/www.datocms-assets.com\/75231\/1719177656-image3.png?dpr=0.5&amp;fm=webp 1263w, https:\/\/www.datocms-assets.com\/75231\/1719177656-image3.png?dpr=0.75&amp;fm=webp 1894w, https:\/\/www.datocms-assets.com\/75231\/1719177656-image3.png?fm=webp 2526w\" sizes=\"(max-width: 2526px) 100vw, 2526px\" type=\"image\/webp\"><source srcset=\"https:\/\/www.datocms-assets.com\/75231\/1719177656-image3.png?dpr=0.25&amp;fm=webp 631w, https:\/\/www.datocms-assets.com\/75231\/1719177656-image3.png?dpr=0.5&amp;fm=webp 1263w, https:\/\/www.datocms-assets.com\/75231\/1719177656-image3.png?dpr=0.75&amp;fm=webp 1894w, https:\/\/www.datocms-assets.com\/75231\/1719177656-image3.png?fm=webp 2526w\" sizes=\"(max-width: 2526px) 100vw, 2526px\"><img decoding=\"async\" src=\"https:\/\/www.datocms-assets.com\/75231\/1719177656-image3.png?fm=webp\" alt loading=\"lazy\"><\/picture><\/noscript><\/div>\n<\/div>\n<p><\/button><\/figure>\n<p class>One of the endpoints,<code>\/api\/pull<\/code>, can be used to download a model from an Ollama registry.&nbsp;<\/p>\n<p class>By default, models are downloaded from Ollama\u2019s official registry (<code>registry.ollama.com<\/code>), however, it is also possible to fetch models from private registries.<\/p>\n<figure><button class=\"w-full cursor-zoom-in\"><\/p>\n<div class=\"relative overflow-hidden rounded-md sm:rounded-xl w-full shadow-md sm:shadow-xl\">\n<div class=\"z-[1]\"><img decoding=\"async\" aria-hidden=\"true\" alt src=\"data:image\/jpeg;base64,\/9j\/4AAQSkZJRgABAQAAAQABAAD\/2wCEAAoHBwgHBgoRCAgFChQLGhgWGA0NBR0VFg0OFx8ZGBYVFx0aHzclHR0oHSEWJDUlKC0vMjIyGSI4PTcwPCsxMi8BCgsLDg0OHQ0QFS8oFhw7Ly8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vL\/\/AABEIAAQAGAMBIgACEQEDEQH\/xAAXAAEBAQEAAAAAAAAAAAAAAAAAAgYB\/8QAJBAAAAMFCQAAAAAAAAAAAAAAAAQFAQIDBuEHERIhI3GBlcH\/xAAVAQEBAAAAAAAAAAAAAAAAAAABAP\/EABQRAQAAAAAAAAAAAAAAAAAAAAD\/2gAMAwEAAhEDEQA\/AMIVnhUKQ9OCicp1\/op+0hZebmVlrp6jgAKjM\/q8YszFAQGbJdQABJ\/\/2Q==\"><noscript><picture><source srcset=\"https:\/\/www.datocms-assets.com\/75231\/1719177716-image4-1.png?dpr=0.25&amp;fm=webp 414w, https:\/\/www.datocms-assets.com\/75231\/1719177716-image4-1.png?dpr=0.5&amp;fm=webp 829w, https:\/\/www.datocms-assets.com\/75231\/1719177716-image4-1.png?dpr=0.75&amp;fm=webp 1243w, https:\/\/www.datocms-assets.com\/75231\/1719177716-image4-1.png?fm=webp 1658w\" sizes=\"(max-width: 1658px) 100vw, 1658px\" type=\"image\/webp\"><source srcset=\"https:\/\/www.datocms-assets.com\/75231\/1719177716-image4-1.png?dpr=0.25&amp;fm=webp 414w, https:\/\/www.datocms-assets.com\/75231\/1719177716-image4-1.png?dpr=0.5&amp;fm=webp 829w, https:\/\/www.datocms-assets.com\/75231\/1719177716-image4-1.png?dpr=0.75&amp;fm=webp 1243w, https:\/\/www.datocms-assets.com\/75231\/1719177716-image4-1.png?fm=webp 1658w\" sizes=\"(max-width: 1658px) 100vw, 1658px\"><img decoding=\"async\" src=\"https:\/\/www.datocms-assets.com\/75231\/1719177716-image4-1.png?fm=webp\" alt loading=\"lazy\"><\/picture><\/noscript><\/div>\n<\/div>\n<p><\/button><figcaption class=\"mt-5 block px-8 text-center text-sm\">Pulling a model from a private registry <\/figcaption><\/figure>\n<p class>While Ollama&#8217;s official registry can be considered &#8220;trusted,&#8221; anyone can set up their own registry and host models on it. As researchers, we were interested in this attack surface \u2013 are private registries being blindly trusted? What damage could a malicious private registry cause?&nbsp;<\/p>\n<p class>What we found is that when pulling a model from a private registry (by querying the <code>http:\/\/[victim]:11434\/api\/pull<\/code> API endpoint), it is possible to supply a malicious manifest file that contains a path traversal payload in the <code>digest<\/code> field.&nbsp;<\/p>\n<p class>Example:&nbsp;<\/p>\n<div class=\"not-prose group relative overflow-hidden rounded-md sm:rounded-lg\" readability=\"17\">\n<pre><code class=\"break-all !rounded-none\"><span><span>{\n<\/span><\/span><span><span> <\/span><span class=\"hljs-attr\">\"schemaVersion\"<\/span><span>: <\/span><span>2<\/span><span>,\n<\/span><\/span><span><span> <\/span><span class=\"hljs-attr\">\"mediaType\"<\/span><span>: <\/span><span>\"application\/vnd.docker.distribution.manifest.v2+json\"<\/span><span>,\n<\/span><\/span><span><span> <\/span><span class=\"hljs-attr\">\"config\"<\/span><span>: {\n<\/span><\/span><span><span> <\/span><span class=\"hljs-attr\">\"mediaType\"<\/span><span>: <\/span><span>\"application\/vnd.docker.container.image.v1+json\"<\/span><span>,\n<\/span><\/span><span><span> <\/span><span class=\"hljs-attr\">\"digest\"<\/span><span>: <\/span><span>\"..\/..\/..\/..\/..\/..\/..\/..\/..\/..\/..\/..\/..\/..\/..\/..\/..\/..\/..\/traversal\"<\/span><span>,\n<\/span><\/span><span><span> <\/span><span class=\"hljs-attr\">\"size\"<\/span><span>: <\/span><span>5<\/span><span>\n<\/span><\/span><span> },\n<\/span><span><span> <\/span><span class=\"hljs-attr\">\"layers\"<\/span><span>: [\n<\/span><\/span><span> {\n<\/span><span><span> <\/span><span class=\"hljs-attr\">\"mediaType\"<\/span><span>: <\/span><span>\"application\/vnd.ollama.image.license\"<\/span><span>,\n<\/span><\/span><span><span> <\/span><span class=\"hljs-attr\">\"digest\"<\/span><span>: <\/span><span>\"..\/..\/..\/..\/..\/..\/..\/..\/..\/..\/..\/..\/..\/..\/..\/..\/..\/..\/..\/..\/..\/traversal\"<\/span><span>,\n<\/span><\/span><span><span> <\/span><span class=\"hljs-attr\">\"size\"<\/span><span>: <\/span><span>7020<\/span><span>\n<\/span><\/span><span> }\n<\/span><span> ]\n<\/span><span>}\n<\/span><span><\/span><\/code><\/pre>\n<p><button class=\"absolute right-3 top-3 flex size-8 items-center justify-center rounded-md border border-white\/20 opacity-0 transition-opacity duration-200 hover:bg-gray-light\/10 active:bg-gray-medium\/20 group-hover:opacity-100\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" class=\"lucide lucide-copy size-4 text-gray-medium\"><rect width=\"14\" height=\"14\" x=\"8\" y=\"8\" rx=\"2\" ry=\"2\" \/><path d=\"M4 16c-1.1 0-2-.9-2-2V4c0-1.1.9-2 2-2h10c1.1 0 2 .9 2 2\" \/><\/svg><\/button><\/div>\n<p class>The <code><em>digest<\/em><\/code> field of a given layer should be equal to the hash of the layer. Among other things, the <code><em>digest<\/em><\/code> of the layer is also used to store the model file on the disk:&nbsp;&nbsp;<\/p>\n<p class><code>\/root\/.ollama\/models\/blobs\/sha256-04778965089b91318ad61d0995b7e44fad4b9a9f4e049d7be90932bf8812e828<\/code><\/p>\n<p class>However, we found that the <code><em>digest <\/em><\/code>field <u>was <\/u>used without proper validation, resulting in path traversal when attempting to store it on the filesystem. This issue can be exploited to corrupt arbitrary files on the system.&nbsp;<\/p>\n<h2>Achieving Arbitrary File Read&nbsp;<\/h2>\n<p class>By exploiting the previous issue, we can plant an additional malicious manifest file on the server (e.g<code>\/root\/.ollama\/models\/manifests\/%ATTACKER_IP%\/library\/manifest\/latest<\/code>), which effectively registers a new model to the server. We found out that if our model\u2019s manifest contains a traversal payload for the <code>digest<\/code> of one of its layers, when attempting to push this model to a remote registry via the <code>http:\/\/[victim]:11434\/api\/push<\/code> endpoint, the server will leak the content of the file specified in the <code>digest <\/code>field.&nbsp;<\/p>\n<figure><button class=\"w-full cursor-zoom-in\"><\/p>\n<div class=\"relative overflow-hidden rounded-md sm:rounded-xl w-full shadow-md sm:shadow-xl\">\n<div class=\"z-[1]\"><img decoding=\"async\" aria-hidden=\"true\" alt src=\"data:image\/jpeg;base64,\/9j\/4AAQSkZJRgABAQAAAQABAAD\/2wCEAAoHBwgHBgoREQgREhMLDg4QDg0NFRUNDQ0MFxMZGBYTFhUaHysjGh0oHRUWJDUlKC0vMjIyGSI4PTcwPCsxMi8BCgsLDg0OFQoNHC8cFigvLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vLy8vL\/\/AABEIAAwAGAMBIgACEQEDEQH\/xAAXAAEAAwAAAAAAAAAAAAAAAAAFAAEG\/8QAHBAAAgEFAQAAAAAAAAAAAAAAAAIBAwUSITER\/8QAFgEAAwAAAAAAAAAAAAAAAAAAAAEC\/8QAGBEAAgMAAAAAAAAAAAAAAAAAAFEBAiL\/2gAMAwEAAhEDEQA\/AMu2pBLi0rVHY2wVdEXLhIoiqB2qS0kL8jIgBlH\/2Q==\"><noscript><picture><source srcset=\"https:\/\/www.datocms-assets.com\/75231\/1719178012-image5.png?dpr=0.25&amp;fm=webp 233w, https:\/\/www.datocms-assets.com\/75231\/1719178012-image5.png?dpr=0.5&amp;fm=webp 467w, https:\/\/www.datocms-assets.com\/75231\/1719178012-image5.png?dpr=0.75&amp;fm=webp 701w, https:\/\/www.datocms-assets.com\/75231\/1719178012-image5.png?fm=webp 935w\" sizes=\"(max-width: 935px) 100vw, 935px\" type=\"image\/webp\"><source srcset=\"https:\/\/www.datocms-assets.com\/75231\/1719178012-image5.png?dpr=0.25&amp;fm=webp 233w, https:\/\/www.datocms-assets.com\/75231\/1719178012-image5.png?dpr=0.5&amp;fm=webp 467w, https:\/\/www.datocms-assets.com\/75231\/1719178012-image5.png?dpr=0.75&amp;fm=webp 701w, https:\/\/www.datocms-assets.com\/75231\/1719178012-image5.png?fm=webp 935w\" sizes=\"(max-width: 935px) 100vw, 935px\"><img decoding=\"async\" src=\"https:\/\/www.datocms-assets.com\/75231\/1719178012-image5.png?fm=webp\" alt loading=\"lazy\"><\/picture><\/noscript><\/div>\n<\/div>\n<p><\/button><\/figure>\n<h2>Finally, Remote Code Execution&nbsp;<\/h2>\n<p class>As we mentioned previously, it is possible to exploit the Arbitrary File Write vulnerability to corrupt certain files in the system. In Docker installations, it is pretty straightforward to exploit it and achieve <a href=\"https:\/\/www.wiz.io\/academy\/remote-code-execution-rce-attack\">Remote Code Execution<\/a>, as the server runs with<code><em>root<\/em><\/code> privileges.&nbsp;<\/p>\n<p class>The simplest way we thought of achieving remote-code-execution would be to corrupt <a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/man7.org\/linux\/man-pages\/man8\/ld.so.8.html\"><code><u>ld.so<\/u><\/code><\/a><code> <\/code>configuration files, specifically <code>\/etc\/ld.so.preload<\/code>. This file contains a whitespace <u>&#8211;<\/u>separated list of shared libraries that should be loaded whenever a new process starts. Using our Arbitrary File Write exploit-primitive, we plant our payload as a shared library on the filesystem (<code>\/root\/bad.so<\/code>) and then we corrupt <code>etc\/ld.so.preload<\/code> to include it. Finally, we query the <code>\/api\/chat<\/code> endpoint on the Ollama API Server, which subsequently creates a new process and thus loads our payload!&nbsp;<\/p>\n<p class>Regarding exploitation of instances which do not run with <code>root<\/code> privileges &#8211; we do have a strategy for exploitation that leverages our \/Arbitrary File Read primitive. However, it will be left as an exercise for the reader ????&nbsp;<\/p>\n<p class>&nbsp;CVE-2024-37032 is an easy-to-exploit remote code execution that affects modern AI infrastructure. Despite the codebase being relatively new and written in modern programming languages, classic vulnerabilities such as <a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/owasp.org\/www-community\/attacks\/Path_Traversal\"><u>Path Traversal<\/u><\/a> remain an issue.&nbsp;<\/p>\n<p class>Security teams should update their Ollama instances to the latest version to mitigate this vulnerability. Furthermore, it is recommended not to expose Ollama to the internet unless it is protected by some sort of authentication mechanism, such a reverse-proxy.&nbsp;<\/p>\n<p class>We responsibly disclosed this vulnerability to Ollama\u2019s development team in May 2024. Ollama promptly investigated and addressed the issue while keeping us updated.&nbsp;<\/p>\n<ul readability=\"4.5\">\n<li readability=\"0\">\n<p class=\"my-0\"><strong>May 5, 2024 <\/strong>\u2013 Wiz Research reported the issue to Ollama.<\/p>\n<\/li>\n<li readability=\"0\">\n<p class=\"my-0\"><strong>May 5, 2024<\/strong> \u2013 Ollama acknowledged the receipt of the report.&nbsp;<\/p>\n<\/li>\n<li readability=\"0\">\n<p class=\"my-0\"><strong>May 5, 2024<\/strong> \u2013 Ollama notified Wiz Research that they committed a fix to GitHub.&nbsp;<\/p>\n<\/li>\n<li readability=\"0\">\n<p class=\"my-0\"><strong>May 8, 2024<\/strong> \u2013 Ollama released a patched version.&nbsp;<\/p>\n<\/li>\n<li readability=\"0\">\n<p class=\"my-0\"><strong>June 24, 2024<\/strong> \u2013 Wiz Research published a blog about the issue.&nbsp;<\/p>\n<\/li>\n<\/ul>\n<p class>Ollama committed a fix in about 4 hours after receiving our initial report, demonstrating an impressive response time and commitment to their product security.&nbsp;<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/36037\/Probllama-Ollama-Remote-Code-Execution-Vulnerability.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":56411,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[968],"class_list":["post-56410","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlineflaw"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Probllama: Ollama Remote Code Execution Vulnerability 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/probllama-ollama-remote-code-execution-vulnerability\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Probllama: Ollama Remote Code Execution Vulnerability 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/probllama-ollama-remote-code-execution-vulnerability\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-26T13:34:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.datocms-assets.com\/75231\/1719177462-image1.png?fm=webp\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/probllama-ollama-remote-code-execution-vulnerability\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/probllama-ollama-remote-code-execution-vulnerability\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Probllama: Ollama Remote Code Execution Vulnerability\",\"datePublished\":\"2024-06-26T13:34:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/probllama-ollama-remote-code-execution-vulnerability\/\"},\"wordCount\":1489,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/probllama-ollama-remote-code-execution-vulnerability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/06\/probllama-ollama-remote-code-execution-vulnerability.jpg\",\"keywords\":[\"headline,flaw\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/probllama-ollama-remote-code-execution-vulnerability\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/probllama-ollama-remote-code-execution-vulnerability\/\",\"name\":\"Probllama: Ollama Remote Code Execution Vulnerability 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/probllama-ollama-remote-code-execution-vulnerability\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/probllama-ollama-remote-code-execution-vulnerability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/06\/probllama-ollama-remote-code-execution-vulnerability.jpg\",\"datePublished\":\"2024-06-26T13:34:32+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/probllama-ollama-remote-code-execution-vulnerability\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/probllama-ollama-remote-code-execution-vulnerability\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/probllama-ollama-remote-code-execution-vulnerability\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/06\/probllama-ollama-remote-code-execution-vulnerability.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/06\/probllama-ollama-remote-code-execution-vulnerability.jpg\",\"width\":24,\"height\":5},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/probllama-ollama-remote-code-execution-vulnerability\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,flaw\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/headlineflaw\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Probllama: Ollama Remote Code Execution Vulnerability\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Probllama: Ollama Remote Code Execution Vulnerability 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/probllama-ollama-remote-code-execution-vulnerability\/","og_locale":"en_US","og_type":"article","og_title":"Probllama: Ollama Remote Code Execution Vulnerability 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/probllama-ollama-remote-code-execution-vulnerability\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-06-26T13:34:32+00:00","og_image":[{"url":"https:\/\/www.datocms-assets.com\/75231\/1719177462-image1.png?fm=webp","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/probllama-ollama-remote-code-execution-vulnerability\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/probllama-ollama-remote-code-execution-vulnerability\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Probllama: Ollama Remote Code Execution Vulnerability","datePublished":"2024-06-26T13:34:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/probllama-ollama-remote-code-execution-vulnerability\/"},"wordCount":1489,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/probllama-ollama-remote-code-execution-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/06\/probllama-ollama-remote-code-execution-vulnerability.jpg","keywords":["headline,flaw"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/probllama-ollama-remote-code-execution-vulnerability\/","url":"https:\/\/www.threatshub.org\/blog\/probllama-ollama-remote-code-execution-vulnerability\/","name":"Probllama: Ollama Remote Code Execution Vulnerability 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/probllama-ollama-remote-code-execution-vulnerability\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/probllama-ollama-remote-code-execution-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/06\/probllama-ollama-remote-code-execution-vulnerability.jpg","datePublished":"2024-06-26T13:34:32+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/probllama-ollama-remote-code-execution-vulnerability\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/probllama-ollama-remote-code-execution-vulnerability\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/probllama-ollama-remote-code-execution-vulnerability\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/06\/probllama-ollama-remote-code-execution-vulnerability.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/06\/probllama-ollama-remote-code-execution-vulnerability.jpg","width":24,"height":5},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/probllama-ollama-remote-code-execution-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,flaw","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlineflaw\/"},{"@type":"ListItem","position":3,"name":"Probllama: Ollama Remote Code Execution Vulnerability"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/56410","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=56410"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/56410\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/56411"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=56410"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=56410"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=56410"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}